Hacking & Security: Advanced v6

Formations Hacking & Securite : Avance v6

OBJECTIF

This course is an advanced and practical approach to the methodologies used in intrusion into corporate networks. We emphasize the technical understanding and practical application of the different forms of existing attacks. The objective is to provide you with the technical skills necessary to perform security audits (penetration tests), judging for yourself the criticality and the real impact of the vulnerabilities discovered on the IS.

In particular, the objectives of the training are as follows:

  • Understand and detect attacks on an IS
  • Define the impact and scope of a vulnerability.
  • Perform a penetration test.
  • Correct the vulnerabilities.

PREREQUISITES

• Windows / Linux Administration / Using Linux from the TCP / IP Command Line

GENERAL INFORMATION

• Code : HSA
• schedule : 5 Days
• Horaires : 8h30 - 17h30
• place : training center, Center Urbain Nord

TARGETED AUDIENCE

  • • RSSI, DSI
  • • Security Consultants
  • • Engineers / technicians
  • • Network System Administrators / Developers

RESOURCES

• Course materials
• 40% demonstration
• 40% of theory
• 20% practical exercises

PROGRAM OF TRAINING

  • Days 1
  • Introduction
  • • TCP / IP / Hardware Network Recall

    • Protos / OSI - IP addressing

  • Introduction to the eve
  • • Vocabulary

    • BDD of Vulnerabilities and Exploits

  • Taking information
  • • Public information

    • Search engine

    •Active information taking

  • Scan and impression taking
  • • Enumeration of machines

    • Acquisition of the operating system

    •Impression taking of services

  • Days 2
  • Attaques réseau
  • • Idle Host Scanning

    • Sniffing réseau

    •Hijacking

    • Attacks on secure protocols

    •Denial of service

    • Spoofing réseau

  • System attacks
  • • Vulnerability scanner

    • Exploitation of a remote vulnerable service

    • Privilege escalation

    • Spy system

    • Attacks via malware

    • Malware generation via Metasploit

    • Control EIP

    • Encoding payloads

    •Detection method

  • Days 3
  • Web attacks
  • • Site mapping and identification of information leaks

    • FPHP flaws (include, fopen, upload etc.)

    • SQL Injections

    • Cross-Site Scripting (XSS)

    • Cross-Site Request Forgery (CSRF)

    - Good practices

  • Days 4
  • Application attacks
  • • Escape Shell

    • Buffer overflow sous Linux

    • Intel x86 architecture

    • The registers

    • The battery and its operation

    • Presentation of standard attack methods

    •Overwriting variables

    • Control EIP

    • Run a shellcode

    •Take control of the system as a root user

  • Days 5
  • Challenge final
  • • Putting into practice the knowledge acquired during the week on a final TP

Do not hesitate to contact our experts for any additional information, study and free calculation of an audit service.